CreateInterface
Static task
static1
Behavioral task
behavioral1
Sample
BaDBoY v5/BaDBoYv5.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
BaDBoY v5/BaDBoYv5.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
BaDBoY v5/BaDBoYv5.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
BaDBoY v5/BaDBoYv5.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
DarkCheats.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
DarkCheats.url
Resource
win10v2004-20231215-en
General
-
Target
23ed5204ce417e045540510e0f31afac
-
Size
611KB
-
MD5
23ed5204ce417e045540510e0f31afac
-
SHA1
61c8df0b4ebca63410fc8dc5dcf8623ee7ec304b
-
SHA256
e7304eecfa4971b70360547ab5381734755ac8240d33bbfeaadcad402cf499c0
-
SHA512
f2741cea380294c3cac483d96ba5c2baef377f064a5ec50121b551ce83e1cc195aa1d13d88a220240f74066b8efb80c421fd1b8847a12c03dbe0f2e694bec29f
-
SSDEEP
12288:hmv01VpAbkhVoj8YDis4WOAOB54Aug5AfXZdj55lzJTBiiqzgC534K57QZMD:hYSPAKVoZvu547DfDj5538Jd7QZo
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/BaDBoY v5/BaDBoYv5.dll unpack001/BaDBoY v5/BaDBoYv5.exe
Files
-
23ed5204ce417e045540510e0f31afac.rar
-
BaDBoY v5/BG/Thumbs.db
-
BaDBoY v5/BG/background.bmp
-
BaDBoY v5/BaDBoYv5.cfg
-
BaDBoY v5/BaDBoYv5.dll.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Exports
Exports
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
BaDBoY v5/BaDBoYv5.exe.exe windows:4 windows x86 arch:x86
4f4f42aaa8936db76e48fd9fc976a785
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetProcAddress
GetModuleHandleA
GlobalFree
ReadProcessMemory
GlobalAlloc
OpenProcess
CloseHandle
SetThreadContext
SuspendThread
Sleep
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetThreadContext
GetExitCodeThread
WaitForSingleObject
CreateRemoteThread
ExitProcess
LoadLibraryA
Process32Next
Process32First
CreateToolhelp32Snapshot
Thread32Next
Thread32First
FindFirstFileA
TerminateProcess
GetModuleFileNameA
GetStringTypeA
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStartupInfoA
GetCommandLineA
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
user32
DialogBoxParamA
EndDialog
GetAsyncKeyState
MessageBoxA
GetDlgItemTextA
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
BaDBoY v5/Menu.txt
-
BaDBoY v5/name.cfg
-
BaDBoY v5/rates.cfg
-
BaDBoY v5/sharingan.cfg
-
BaDBoY v5/speed.cfg
-
BaDBoY v5/vec_switch.cfg
-
DarkCheats.url.url
-
darkcheats.txt